You are here
Home > Preporuke > Sigurnosni nedostatak jezgre operacijskog sustava

Sigurnosni nedostatak jezgre operacijskog sustava

==========================================================================
Ubuntu Security Notice USN-2611-1
May 20, 2015

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 LTS

Summary:

The system could be made to crash if it received specially crafted
network traffic.

Software Description:
– linux: Linux kernel

Details:

Vincent Tondellier discovered an integer overflow in the Linux kernel’s
netfilter connection tracking accounting of loaded extensions. An attacker
on the local area network (LAN) could potential exploit this flaw to cause
a denial of service (system crash of targeted system).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
linux-image-3.2.0-84-generic 3.2.0-84.121
linux-image-3.2.0-84-generic-pae 3.2.0-84.121
linux-image-3.2.0-84-highbank 3.2.0-84.121
linux-image-3.2.0-84-omap 3.2.0-84.121
linux-image-3.2.0-84-powerpc-smp 3.2.0-84.121
linux-image-3.2.0-84-powerpc64-smp 3.2.0-84.121
linux-image-3.2.0-84-virtual 3.2.0-84.121

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

References:
http://www.ubuntu.com/usn/usn-2611-1
CVE-2014-9715

Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-84.121

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIcBAEBCgAGBQJVXHCrAAoJEAUvNnAY1cPY5mcQAKl9dp4GKJ8laQ8Qz/Sqd71h
PNZB5Vi28Psw2Eahxt7YbBjRRcRXckVnEwNjMrD/O54MufE1X/XJuK+pl48sEG2U
cwJ1g8BoG9pkSd6BpTsaTHBLdUWM34l5Jct8J1wPwTeqSwjdac9EVQGXTwdxI8Gb
GfSNgDMMwzqvLxjCyKaikQusAJ/SC87pf7mXNLBFQR8VcOWl2Olp/h9l+RV/7clM
6w+sjwDffsVKQAsXfKiJbA7Kn7wipG2cP9r0OlZslR+0nxzyJGVe+hzqJ3Dz2Bia
J6ftyf48bebqa0tazZi6ZENWfqobrWxXdWiReYsZ8mXGZkrXBVq2vuVPzonhUvFB
MWeUQpvvptYhWx82h3V4mN02T5/P6W2hyYAO1dL2lh+pQqHtlaVEqGW/HvBZqViz
avnEw+YuKqm33c+6TAxgOW/x717mVsXql7XodGKPx4xXxooeSuY5+KAonx+PirJ+
9yZGw+JDhMnK2/aKi+3wDND/Owfopel1RoMShGbeNVLW1yFbEnTXH56aezxynueE
65puGofeBO/HTcnSatvBYxe+irjKCZZJO4s9doKZJarEo12+xeXv1Zxq7k1Axfpw
s2a6TEO5ObhfUoA6Xq81IL73DyTV1pJXCnX7YjEE4x0h24yYwjchNH9/7vMBLXxp
pI6ITfY0ZGSAvyWyQNTs
=CTuS
—–END PGP SIGNATURE—–

Top
More in Preporuke
Ranjivosti programskog paketa openssl

Otkriveno je više ranjivosti u programskom paketu openssl za HP-UX. Ranjivosti su uzrokovane brojnim nepravilnostima, a što se odnosi na...

Close